diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2011-06-17 16:25:39 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2011-07-13 05:31:26 +0200 |
commit | ec15d0b0d6d43e8f9daf6282c7f22dacf5e2f089 (patch) | |
tree | ad090d2fa1efc39b8a1558f11cb08fb06893e672 /kernel | |
parent | 29ee67cbbaac453bea60fcf843e91b9cb3f49874 (diff) |
inet_diag: fix inet_diag_bc_audit()
[ Upstream commit eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d ]
A malicious user or buggy application can inject code and trigger an
infinite loop in inet_diag_bc_audit()
Also make sure each instruction is aligned on 4 bytes boundary, to avoid
unaligned accesses.
Reported-by: Dan Rosenberg <drosenberg@vsecurity.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions